CN111931831B - Method and system for identifying air interaction group - Google Patents

Method and system for identifying air interaction group Download PDF

Info

Publication number
CN111931831B
CN111931831B CN202010748479.2A CN202010748479A CN111931831B CN 111931831 B CN111931831 B CN 111931831B CN 202010748479 A CN202010748479 A CN 202010748479A CN 111931831 B CN111931831 B CN 111931831B
Authority
CN
China
Prior art keywords
evidence
target
value
determining
decision
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN202010748479.2A
Other languages
Chinese (zh)
Other versions
CN111931831A (en
Inventor
杨璐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chinese People's Liberation Army 91776
Original Assignee
Chinese People's Liberation Army 91776
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chinese People's Liberation Army 91776 filed Critical Chinese People's Liberation Army 91776
Priority to CN202010748479.2A priority Critical patent/CN111931831B/en
Publication of CN111931831A publication Critical patent/CN111931831A/en
Application granted granted Critical
Publication of CN111931831B publication Critical patent/CN111931831B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Computation (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Physics & Mathematics (AREA)
  • Artificial Intelligence (AREA)
  • Physics & Mathematics (AREA)
  • Evolutionary Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Medical Informatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses a method and a system for identifying an air interaction group, which are used for improving the identification efficiency of the interaction group. The method provided by the application comprises the following steps: determining related evidence information; constructing an evidence matrix according to the evidence information; calculating an evidence value of the evidence matrix; calculating a decision value of a target according to the evidence value; and determining the air interaction group according to the decision value of the target. The application also provides an identification system of the aerial interaction group.

Description

Method and system for identifying air interaction group
Technical Field
The present application relates to the field of target grouping technologies, and in particular, to a method and a system for identifying an air interaction group.
Background
Weapon platforms distributed in different spaces can strike the same target. In order to ensure that the commander can fully recognize the battlefield situation, recognize the situation of the enemy and my, and make a correct operation command decision, the weapon platforms need to be classified according to the targets which the weapon platforms may strike. The identification and differentiation can be classified as an interaction group, belonging to the target grouping problem in the situation awareness field. An interaction group is a group consisting of a plurality of tactically related space groups, each interaction group having a tactical objective and being implemented by the cooperative combat of the plurality of space groups contained therein. In the prior art, subjective judgment of people is mainly relied on, authenticity of evidence is not considered, and identification effectiveness of interaction groups is not high.
Disclosure of Invention
In view of the above technical problems, embodiments of the present application provide a method and a system for identifying an aerial interaction group, so as to obtain a more scientific and reasonable identification result, identify an aerial interaction group more comprehensively and accurately, and improve the identification efficiency of the interaction group.
In one aspect, an identification method for an air interaction group provided in an embodiment of the present application includes:
determining related evidence information;
constructing an evidence matrix according to the evidence information;
calculating an evidence value of the evidence matrix;
calculating a decision value of a target according to the evidence value;
and determining the air interaction group according to the decision value of the target.
Preferably, the constructing an evidence matrix according to the evidence information includes:
setting decision threshold values of various pieces of evidence of the target, and constructing an evidence matrix, wherein N is the number of space group targets to be identified, and M is the number of the evidence of the target to be identified.
Further, the calculating the evidence value of the evidence matrix includes:
determining an evidence validity factor;
and calculating an evidence value of the evidence matrix according to the evidence validity factor.
The determining the evidence validity factor specifically includes:
setting an evidence impact factor matrix L B×M ={l b,m Wherein B =1,2, \8230, B, M =1,2, \8230, M, B is the number of influencing factors of each evidence;
determining a positive ideal solution
Figure BDA0002609217370000021
Sum negative ideal solution
Figure BDA0002609217370000022
Wherein:
Figure BDA0002609217370000023
Figure BDA0002609217370000024
respectively calculating Euclidean distances between each item of evidence influence factor and the positive ideal solution and the negative ideal solution:
Figure BDA0002609217370000031
Figure BDA0002609217370000032
determining and determining an evidence validity factor C according to the Euclidean distance m
Figure BDA0002609217370000033
Further, the calculating an evidence value of the evidence matrix according to the evidence validity factor specifically includes:
determining an evidence matrix A N×M ={a n,m Initial value a of each evidence in nm N =1,2, \8230, N, M =1,2, \8230, M, more than or equal to zero and less than or equal to 1, N is the number of space group targets to be identified, and M is the number of evidences of the targets to be identified;
when a is nm At 1, the evidence values are:
Figure BDA0002609217370000034
when a is nm At 0, the evidence values are:
Figure BDA0002609217370000035
wherein,
Figure BDA0002609217370000036
and taking a value for the mth target evidence corresponding to the nth target to be identified.
The calculating a decision value of the target according to the evidence value comprises:
decision value Z of nth target to be identified n Determined by the following equation:
Figure BDA0002609217370000037
where N =1,2, \8230;, N.
Further, the determining an air interaction group according to the decision value of the target specifically includes:
determining a decision judgment threshold H;
according to the decision value Z of the target n And the decision judgment threshold H is used for judging whether to attack the air defense troop of the party;
and determining all space groups in which targets which are judged to be probably attacked by the air defense troops are positioned as interaction groups.
Further, the decision value Z according to the target n And the decision judgment threshold H is used for judging whether to attack the air defense troop of the party, and the decision judgment threshold H specifically comprises the following steps:
whether to attack our air defense team is determined by the following formula:
Figure BDA0002609217370000041
wherein, the decision judgment threshold H is determined by the following formula:
Figure BDA0002609217370000042
further, after determining the air interaction group, the method further includes:
and tracking and monitoring the aerial interaction groups, and adjusting the aerial interaction groups according to the tracking and monitoring results.
According to the method, the evidence validity factor is introduced to evaluate the authenticity of the evidence, so that a more scientific and reasonable identification result is obtained, the air interaction group is identified more comprehensively and accurately, and the identification efficiency of the interaction group is improved.
Correspondingly, the invention also provides an identification system of the air interaction group, which comprises the following components:
the system comprises a processor, a memory and a collector;
the collector collects information under the control of the processor;
the memory stores a program that can be read and executed by the processor;
the processor, when executing the program, implements one of the methods of identifying all air interaction groups in the method claim.
According to the method and the system, the evidence validity factor is introduced to evaluate the authenticity of the evidence, so that a more scientific and reasonable identification result is obtained, the air interaction group is identified more comprehensively and accurately, and the identification efficiency of the interaction group is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a schematic diagram of a prior art method for clustering species;
FIG. 2 is a schematic diagram of a method for identifying an airborne interaction group according to an embodiment of the present application;
FIG. 3 is a spatial distribution diagram of a target space group according to an embodiment of the present disclosure;
FIG. 4 is a spatial distribution diagram of an enemy air target space group without evidence authenticity factor identification provided by an embodiment of the present application;
FIG. 5 is a spatial distribution diagram of an enemy air target space group identified by considering evidence authenticity factors, provided by an embodiment of the present application;
fig. 6 is a schematic diagram of an identification system of an air interaction group according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the present invention will be described in further detail with reference to the accompanying drawings, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without making any creative effort based on the embodiments in the present invention, belong to the protection scope of the present invention.
Some of the words that appear in the text are explained below:
1. the term "and/or" in the embodiments of the present invention describes an association relationship of associated objects, and indicates that three relationships may exist, for example, a and/or B may indicate: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
2. In the embodiments of the present application, the term "plurality" means two or more, and other terms are similar thereto.
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The target clustering is to cluster the target objects step by step according to a certain relationship. Typically, the target clustering level may be classified into 5 levels, as shown in fig. 1.
1. Target object group: each individual entity, i.e. each threat unit present in the battlefield.
2. Space group: in the same space, groups are divided according to a certain classification rule. In the same space group, the attributes of all the target objects are consistent, the behaviors are similar, and the positions are similar.
3. Function group: space groups that perform similar functions. Most of the existing literature documents classify functional groups into space groups.
4. Interaction group: a group consisting of multiple tactically related space groups is essentially a group based on the grouping of space groups. Each interaction group has a tactical objective (attack or defense, etc.) that is achieved by the cooperative engagement of the multiple space groups that it contains.
5. Enemy/me/neutral group: all the interaction groups are divided into 3 big groups according to the marks of enemies, I and the middle cube, and three big battle arrays of a battlefield are formed.
As can be seen from fig. 1, the identification of the interaction group needs to take into account a number of factors, such as the target property, the spatial group to which it belongs, the task and the purpose. In the prior art, subjective judgment of people is mainly relied on, authenticity of evidence is not considered, and identification effectiveness of interaction groups is not high.
Aiming at the technical problems, the application provides a method and a system for identifying the air interaction group, which introduce an evidence validity factor to evaluate the authenticity of the evidence, and further adjust a preliminary conclusion on the basis, so that a more scientific and reasonable identification result is obtained, the air interaction group is identified more comprehensively and accurately, and the identification efficiency of the interaction group is improved.
It should be noted that, in the present application, an ideal solution refers to a supposed optimal solution (solution), and each attribute of the solution reaches the optimal value of each alternative solution; while a negative ideal solution refers to the worst solution (solution) assumed, whose respective properties are the worst values of the alternatives.
The method and the system are based on the same application concept, and because the principles of solving the problems of the method and the system are similar, the implementation of the system and the method can be mutually referred, and repeated parts are not repeated.
Various embodiments of the present application will be described in detail below with reference to the accompanying drawings. It should be noted that the display sequence of the embodiment of the present application only represents the sequence of the embodiment, and does not represent the merits of the technical solutions provided by the embodiments.
Example one
Referring to fig. 2, a schematic diagram of a method for identifying an air interaction group provided in an embodiment of the present application is shown, where the process includes:
s201, determining related evidence information;
aiming at the divided enemy aerial target space group (or function group), a related hypothesis for identifying a target interaction group by judging the consistency of space group target attack attempts is provided, so that various evidence information is obtained.
As a preferred example, target interaction group identification rules and parameter criteria may be further determined that are predicated on the spatial group target attack attempt.
The division of the aerial target space group may be performed by using the method shown in fig. 1, or may be performed according to a set rule according to actual needs, and the present embodiment is not limited to this.
S202, constructing an evidence matrix according to the evidence information;
specifically, firstly, assuming that evidence information is completely true and accurate, an evidence matrix A is constructed by setting decision threshold values of various pieces of evidence of a target and performing corresponding judgment N×M ={a n,m And f, wherein N is the number of space group targets to be identified, and M is the number of evidences of the targets to be identified.
As a preferred example, M is equal to 9, i.e. the number of evidences that the object to be identified has is 9.
As a preferred example, it can also be based on the evidence matrix A N×M And carrying out preliminary demonstration analysis, and obtaining preliminary identification conclusions of the target attack attempt and the interaction group through evidence statistics results of the target attack attempt and the non-attack attempt of the space group.
S203, calculating an evidence value of the evidence matrix;
specifically, in order to be closer to the real situation, an evidence validity factor may be set first, and the evidence value of the evidence matrix is calculated according to the evidence validity factor.
As a preferred example, an evidence validity factor c may be set m ,m=1,2,…,M,c m ∈[0,1]Wherein c is m =0 and c m =1 represents the highest and lowest degree of evidence validity, i.e. fully valid (trustworthy) and fully invalid (untrustworthy), respectively. Evidence validity factor c m The determination of (c) can be performed by:
step 1: setting an evidence impact factor matrix L B×M ={l b,m And the formula is shown in the specification, wherein B =1,2, \8230;, B, M =1,2, \8230;, M and B are influence factor numbers of various evidences. As a preferred example, in setting the impact factor matrix, each impact factor may be normalized and given different weights. The values of the influence factors and the weights may be given by subjective experience, objective methods, or comprehensive approaches, and the specific embodiment is not limited.
Step 2: determining a positive ideal solution
Figure BDA0002609217370000091
Sum negative ideal solution
Figure BDA0002609217370000092
Wherein:
Figure BDA0002609217370000093
Figure BDA0002609217370000094
step 3, respectively calculating Euclidean distances between each evidence influence factor and the positive ideal solution and the negative ideal solution:
Figure BDA0002609217370000095
Figure BDA0002609217370000101
and 4, step 4: determining and determining an evidence validity factor C according to the Euclidean distance m
Figure BDA0002609217370000102
In addition, c is m Smaller values indicate higher evidence validity.
Further, each evidence value a in the obtained evidence matrix is set nm In the [0,1 ]]The inner value, N =1,2, \8230, N, M =1,2, \8230, M, wherein 1 represents a high possibility of attacking me fighting unit, 0 represents a little possibility of attacking me fighting unit, and both 1 and 0 can be clearly distinguished, and 1, 0 and the mean value 0.5 thereof are the distinguishing limit. When the value is 0.5, it is considered to be indistinguishable. In the present embodiment, when the validity and credibility factors are considered,and approaching the value result which is not completely effective and feasible to 0.5.
Specifically, an evidence matrix A is determined N×M ={a n,m Initial value a of each evidence in nm N =1,2, \ 8230;, N, M =1,2, \ 8230;, M, and zero or more and 1 or less, in [0, 1;)]An internal value is obtained, wherein 1 represents that attack on the first side is likely to occur, 0 represents that attack on the first side is hardly caused, N is the number of space group targets to be identified, and M is the number of evidences of the targets to be identified; when a is nm At 1, the evidence values are:
Figure BDA0002609217370000103
when a is nm At 0, the evidence values are:
Figure BDA0002609217370000104
wherein,
Figure BDA0002609217370000105
and taking a value for the mth target evidence corresponding to the nth target to be identified.
In addition, a is nm When the authenticity of the evidence is not considered, the mth target evidence initial value corresponding to the nth target to be identified is obtained; and then
Figure BDA0002609217370000106
When the authenticity of the evidence is considered, the mth target evidence value corresponding to the nth target to be identified is obtained.
Through the steps, the evidence matrix under the condition of considering the authenticity of the evidence can be obtained
Figure BDA0002609217370000107
Wherein N =1,2, \8230;, N, M =1,2, \8230;, M,
Figure BDA0002609217370000111
each element in (1)
Figure BDA0002609217370000112
Are still all in [0,1 ]]An internal value.
And S204, calculating a decision value of the target according to the evidence value.
And on the basis of the evaluation of the evidence effectiveness, the evaluation result is applied to an evidence matrix, and a decision value of the target is calculated.
Aiming at each target to be identified, calculating a corresponding decision value according to the corresponding evidence value, wherein the decision value Z of the nth target to be identified n Determined by the following equation:
Figure BDA0002609217370000113
wherein N =1,2, \8230;, N:
wherein,
Figure BDA0002609217370000114
is the mth target evidence value corresponding to the nth target to be recognized determined in S204 when the evidence authenticity is considered. N is the number of space group targets to be identified, and M is the number of evidences of the targets to be identified.
S205, determining the air interaction group according to the decision value of the target.
Specifically, a decision judgment threshold H is determined, and a decision value Z of the target is determined n And the decision judgment threshold H is used for judging whether to attack the air defense troop of the party;
and determining all space groups in which targets which are judged to be probably attacked by the air defense team are located as interaction groups.
As a preferred example, whether to attack my air defense team can be determined by the following formula:
Figure BDA0002609217370000115
wherein, the decision judgment threshold H can be determined by the following formula:
Figure BDA0002609217370000116
as a preferred example, M is 9 and H is 4.5.
As a preferred example, after the above steps are performed, after the aerial interaction group is identified, that is, after all the space groups where the decision is judged to be the targets that are likely to attack (i.e., reach consistency) the air defense force are identified as the interaction group, the tracking is continuously performed, the monitoring is continuously performed, and the dynamic adjustment and the timely adjustment are performed.
Through the steps, an evidence validity factor is introduced to evaluate the authenticity of the evidence, so that a more scientific and reasonable recognition result is obtained, the air interaction group is recognized more comprehensively and accurately, and the recognition efficiency of the interaction group is improved.
The above steps are further illustrated below with reference to specific examples.
4 air target space groups of the air defense combat army facing the enemy are set, and the 4 air target space groups comprise a cruise missile space group, an anti-ship missile space group, a fighter plane space group and a fighter plane space group.
According to the type and information of the air target of the enemy, the cruise missile space group, the anti-ship missile space group, the fighter plane space group and the fighter plane space group are considered to be likely to attack me. The obtained relevant evidence parameters are shown in table 1, and the spatial distribution diagram is shown in fig. 3.
TABLE 1 relevant evidence parameters for enemy air objects
Figure BDA0002609217370000121
Figure BDA0002609217370000131
The enemy target is divided into 4 space groups, and the evidence parameter of each space group is the average value of the attribute evidence of each target, as shown in table 2.
TABLE 2 relevant evidence parameters for the enemy aerial target space group
Figure BDA0002609217370000132
Without considering the authenticity of the evidence (i.e., all complete trustfulness), an evidence matrix is established as shown in table 3:
TABLE 3 Competition hypothesis analysis matrix Table for airborne target attack attempts
Figure BDA0002609217370000133
Figure BDA0002609217370000141
Under the condition that all evidences are completely credible, the corresponding evidence value of each target space group to be identified is calculated, a corresponding decision value can be obtained, and then the decision value is compared with the decision judgment threshold value H =4.5, so that the decision vector of the enemy air target space group can be obtained, and the result is shown in table 4. Where 1 means that there is a high possibility of attacking me and 0 means that there is little attack on me.
TABLE 4 decision vectors for identification of enemy aerial target space groups without consideration of evidence authenticity
Name of object Cruise missile space group Space group of anti-ship missile Fighter plane space group Space group of fighter bombers
Decision value
0 1 1 1
According to the analysis results in table 4, it is preliminarily considered that the space groups 2, 3, and 4 may attack me, and a credibility factor is introduced and evaluated, as shown in table 5.
TABLE 5 identification evidence authenticity analysis matrix table
Figure BDA0002609217370000142
In the calculation process, the method defines that the scouting ability of our party is insufficient, the enemy unintentionally generates uncertainty, and the enemy intentionally hides true and false as evidence authenticity influence factors, each factor takes an integer value between [0 and 5], 0 and 5 respectively represent the true credibility and the unreal credibility of the evidence, and the solutions of the evidence authenticity influence factors with the values of 0 and 5 are respectively recorded as positive and negative ideal solutions. The adjusted results are shown in Table 6.
Table 6 identification evidence authenticity analysis matrix table
Figure BDA0002609217370000151
On the basis of setting the evidence authenticity factor, the evidence authenticity factor is added into an enemy aerial target evidence matrix, and after the evidence authenticity factor is compared with a decision judgment threshold value H =4.5, a new decision vector is obtained through comprehensive operation, and the result is shown in Table 7.
TABLE 7 New decision vectors for recognition of enemy aerial target space groups under evidence authenticity considerations
Name of object Cruise missile space group Space group of anti-ship missile Fighter plane space group Space group of fighter bombers
Decision value
0 1 0 1
As shown in table 7, space group 2 and space group 4 are likely to attack my air force, and therefore space group 2 and space group 4 constitute an air interaction group. The results obtained by comparing the analyses of tables 4 and 7 are shown in FIGS. 4 and 5. As can be seen from tables 4 and 7 and fig. 4 and 5, the red space group represents a space group which is likely to attack the air defense army, and under the condition that the evaluation result of the evidence authenticity factor is not introduced, the preliminary conclusion is that the space group which is likely to attack the surface ship army of the same party is the space group 2, 3 or 4, and under the condition that the evaluation result of the evidence authenticity factor is introduced, the air interaction group is identified by utilizing competitive hypothesis analysis, and the space group which is likely to attack the air defense army is identified as the space group 2 or 4.
Example two
Based on the same inventive concept, an embodiment of the present invention further provides an identification system for an air interaction group, as shown in fig. 6, the system includes:
comprises a processor 602, a collector 601, a memory 603 and a program which is stored on the memory 603 and can run on the processor 602; the collector 601 is connected to the processor 602 and the memory 603 through a bus interface.
The collector 601 is used for collecting information under the control of the processor;
the processor 602 is configured to read the program in the memory 603, and perform the following processes:
determining related evidence information;
constructing an evidence matrix according to the evidence information;
calculating an evidence value of the evidence matrix;
calculating a decision value of a target according to the evidence value;
and determining the air interaction group according to the decision value of the target.
It should be noted that in fig. 6, the bus architecture may include any number of interconnected buses and bridges, with one or more processors represented by processor 602 and various circuits represented by memory 603 being linked together. The bus architecture may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. The bus interface provides an interface. The processor 602 is responsible for managing the bus architecture and general processing, and the memory 603 may store data used by the processor 602 in performing operations.
The processor 602 is further configured to read the program in the memory 603, and when the program is executed, all the methods and steps of the method for identifying an interaction group in an empty space in an embodiment are implemented, and the same parts are not described again.
It should be noted that the system provided in the second embodiment and the method provided in the first embodiment belong to the same inventive concept, and solve the same technical problem to achieve the same technical effect, and the system provided in the second embodiment can implement all the methods in the first embodiment, and the same parts are not described again.
It should be noted that the division of the unit in the embodiment of the present application is schematic, and is only a logic function division, and there may be another division manner in actual implementation. In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (7)

1. A method for identifying an airborne interaction group, comprising:
determining related evidence information;
constructing an evidence matrix according to the evidence information;
calculating an evidence value of the evidence matrix;
calculating a decision value of a target according to the evidence value;
determining an aerial interaction group according to the decision value of the target;
the calculating the evidence value of the evidence matrix comprises:
determining an evidence validity factor;
calculating an evidence value of the evidence matrix according to the evidence validity factor;
the determining the evidence validity factor specifically includes:
setting an evidence impact factor matrix L B×M ={l b,m The formula comprises (a) a plurality of groups of genes, wherein B =1,2, \8230;, B, M =1,2, \8230;, M, B are the number of influencing factors of each evidence;
determining a positive ideal solution
Figure FDA0003822422020000011
Sum and minus ideal solution
Figure FDA0003822422020000012
Wherein:
Figure FDA0003822422020000013
Figure FDA0003822422020000014
respectively calculating Euclidean distances between each item of evidence influence factor and the positive ideal solution and the negative ideal solution:
Figure FDA0003822422020000015
Figure FDA0003822422020000016
determining an evidence validity factor C according to the Euclidean distance m
Figure FDA0003822422020000017
Calculating an evidence value of the evidence matrix according to the evidence validity factor specifically includes:
determining an evidence matrix A N×M ={a n,m Initial value a of each evidence in nm N =1,2, \8230, N, M =1,2, \8230, M, more than or equal to zero and less than or equal to 1, N is the number of space group targets to be identified, and M is the number of evidences of the targets to be identified;
when a is nm At 1, the evidence values are:
Figure FDA0003822422020000021
when a is nm At 0, the evidence values are:
Figure FDA0003822422020000022
wherein,
Figure FDA0003822422020000023
is the n-thAnd taking the value of the mth target evidence corresponding to the target to be identified.
2. The method according to claim 1, wherein said constructing an evidence matrix from said evidence information comprises:
setting decision threshold values of all evidences of a target and constructing an evidence matrix A N×M ={a n,m And f, wherein N is the number of space group targets to be identified, and M is the number of evidences of the targets to be identified.
3. The method of claim 1, wherein the calculating a decision value for a target based on the evidence values comprises:
decision value Z of nth target to be identified n Determined by the following equation:
Figure FDA0003822422020000024
where N =1,2, \8230;, N.
4. The method of claim 3, wherein determining the air interaction group based on the decision value of the target comprises:
determining a decision judgment threshold H;
according to the decision value Z of the target n And the decision judgment threshold H is used for judging whether to attack the air defense troop of the party;
and determining all space groups in which targets which are judged to be probably attacked by the air defense team are located as interaction groups.
5. The method of claim 4, wherein the decision value Z according to the goal is n And the decision judgment threshold H is used for judging whether to attack the air defense troop of the party, and the decision judgment threshold H specifically comprises the following steps:
whether to attack our air defense team is determined by the following formula:
Figure FDA0003822422020000025
wherein, the decision judgment threshold H is determined by the following formula: m is the number of evidences that the object to be identified has,
Figure FDA0003822422020000031
6. the method of any one of claims 1 to 5, wherein after determining the air interaction group, further comprising:
and tracking and monitoring the aerial interaction groups, and adjusting the aerial interaction groups according to the tracking and monitoring results.
7. An identification system for airborne interaction groups, comprising:
the system comprises a processor, a memory and a collector;
the collector collects information under the control of the processor;
the memory stores a program that can be read and executed by the processor;
the processor, when executing the program, implements a method of identifying air interaction groups as claimed in one of claims 1 to 6.
CN202010748479.2A 2020-07-30 2020-07-30 Method and system for identifying air interaction group Expired - Fee Related CN111931831B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010748479.2A CN111931831B (en) 2020-07-30 2020-07-30 Method and system for identifying air interaction group

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010748479.2A CN111931831B (en) 2020-07-30 2020-07-30 Method and system for identifying air interaction group

Publications (2)

Publication Number Publication Date
CN111931831A CN111931831A (en) 2020-11-13
CN111931831B true CN111931831B (en) 2022-12-23

Family

ID=73315259

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010748479.2A Expired - Fee Related CN111931831B (en) 2020-07-30 2020-07-30 Method and system for identifying air interaction group

Country Status (1)

Country Link
CN (1) CN111931831B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106850254A (en) * 2016-12-20 2017-06-13 国网新疆电力公司信息通信公司 Key node recognition methods in a kind of power telecom network
CN109063819A (en) * 2018-08-02 2018-12-21 中国人民解放军32153部队 The recognition methods of task community based on Bayesian network
CN110244294A (en) * 2019-06-24 2019-09-17 中国人民解放军空军工程大学航空机务士官学校 A kind of correlating method of the metric data of multisensor
CN110874698A (en) * 2019-11-21 2020-03-10 国网福建省电力有限公司 Black start scheme evaluation method with anti-reverse order and weight self-adaption functions
CN111125453A (en) * 2019-12-27 2020-05-08 中国电子科技集团公司信息科学研究院 Opinion leader role identification method in social network based on subgraph isomorphism and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7328200B2 (en) * 2003-10-27 2008-02-05 Hrl Laboratories, Llc Apparatus, method, and computer program product for converting decision flowcharts into decision probabilistic graphs

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106850254A (en) * 2016-12-20 2017-06-13 国网新疆电力公司信息通信公司 Key node recognition methods in a kind of power telecom network
CN109063819A (en) * 2018-08-02 2018-12-21 中国人民解放军32153部队 The recognition methods of task community based on Bayesian network
CN110244294A (en) * 2019-06-24 2019-09-17 中国人民解放军空军工程大学航空机务士官学校 A kind of correlating method of the metric data of multisensor
CN110874698A (en) * 2019-11-21 2020-03-10 国网福建省电力有限公司 Black start scheme evaluation method with anti-reverse order and weight self-adaption functions
CN111125453A (en) * 2019-12-27 2020-05-08 中国电子科技集团公司信息科学研究院 Opinion leader role identification method in social network based on subgraph isomorphism and storage medium

Also Published As

Publication number Publication date
CN111931831A (en) 2020-11-13

Similar Documents

Publication Publication Date Title
CN110232518A (en) A kind of intimidation estimating method based on three decisions
CN111783020A (en) Multidimensional characteristic battlefield entity target grouping method and system
CN111723946A (en) Federal learning method and device applied to block chain
CN108594645B (en) Planning method and system for single-station multi-unmanned aerial vehicle distribution and flight route
US20150234388A1 (en) Aircraft control device, aircraft, and method for controlling aircraft
CN114139023B (en) Multi-target hierarchical grouping method for marine situation generation based on Louvain algorithm
CN105739304B (en) A kind of more UCAV based on antithetical ideas improved adaptive GA-IAGA strike target distribution method online
CN111931831B (en) Method and system for identifying air interaction group
CN114494771B (en) Federal learning image classification method capable of defending back door attack
CN112232383A (en) Integrated clustering method based on super-cluster weighting
CN107273914B (en) Efficient fusion identification method based on information source self-adaptive dynamic selection
CN113065094A (en) Situation assessment method and system based on accumulated foreground value and three-branch decision
CN114358127A (en) Aerial task group identification method
AU2021102799A4 (en) Method for clustering battlefield entity targets based on multidimensional features and system thereof
CN116739428A (en) Method for analyzing target value of fire striking of subjective and objective weighted TOPSIS (top-down sequence of steps of analysis) soldier
CN110852574A (en) Target threat assessment method and medium based on improved grey target theory
CN115409351A (en) Simplified particle swarm weapon target distribution method with priority
CN112967290A (en) Method for automatically identifying enemies of target aircraft in air by unmanned aerial vehicle
CN114090967A (en) APT (android package) organization tracing and tracing method and system based on PSO-MSVM (Power System-Mobile virtual machine)
CN114120142A (en) Multi-attribute decision-making air target comprehensive identification method and system
Wang et al. PerVK: A Robust Personalized Federated Framework to Defend Against Backdoor Attacks for IoT Applications
CN104899450A (en) Method for judging tuple linguistic model through comprehensive evaluation of target threat level
Xiao et al. FedRMA: A Robust Federated Learning Resistant to Multiple Poisoning Attacks
CN109327476A (en) Method and system for evaluating risk of Web attack on information system
CN113158574B (en) Safety evaluation method for edge computing system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CB03 Change of inventor or designer information

Inventor after: Yang Lu

Inventor after: Zhu Feng

Inventor before: Yang Lu

CB03 Change of inventor or designer information
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20221223

CF01 Termination of patent right due to non-payment of annual fee